Source: pam
X-Debbugs-CC: t...@security.debian.org
Severity: normal
Tags: security

Hi,

The following vulnerability was published for pam.

CVE-2024-10041[0]:
| A vulnerability was found in PAM. The secret information is stored
| in memory, where the attacker can trigger the victim program to
| execute by sending characters to its standard input (stdin). As this
| occurs, the attacker can train the branch predictor to execute an
| ROP chain speculatively. This flaw could result in leaked passwords,
| such as those found in /etc/shadow while performing authentications.

This appeared via Red Hat bugzilla and the currently only public
reference is  https://bugzilla.redhat.com/show_bug.cgi?id=2319212

To me it sounds rather like hardening than an actual security
vulnerability, but it's hard to tell with the information available
so far.


If you fix the vulnerability please also make sure to include the
CVE (Common Vulnerabilities & Exposures) id in your changelog entry.

For further information see:

[0] https://security-tracker.debian.org/tracker/CVE-2024-10041
    https://www.cve.org/CVERecord?id=CVE-2024-10041

Please adjust the affected versions in the BTS as needed.

Reply via email to